{"id":46616,"date":"2022-10-17T13:14:35","date_gmt":"2022-10-17T18:14:35","guid":{"rendered":"https:\/\/www.escapeartist.com\/?page_id=46616"},"modified":"2022-10-17T15:39:47","modified_gmt":"2022-10-17T20:39:47","slug":"how-to-protect-your-computer","status":"publish","type":"page","link":"https:\/\/www.escapeartist.com\/how-to-protect-your-computer\/","title":{"rendered":"HOW TO PROTECT YOUR COMPUTER"},"content":{"rendered":"
<\/p>\n
<\/p>\n
BY PAUL ROSENBERG<\/p>\n
<\/p>\n
\u201cHow do I protect my computer\u201d is one of the questions we hear most often. And so I\u2019d like to answer it today. But before I do, I\u2019d like to remind you that the information that goes to and from your computer is of considerably more value than the computer itself.<\/p>\n
Still, protecting your computer is important, and so we will continue.<\/p>\n
DO I NEED ANTI-VIRUS SOFTWARE?<\/strong><\/p>\n The answer, surprisingly enough, is \u201cnot really.\u201d For one thing, most new computers come with anti-virus software built-in. Windows does, for example. More than that, the various software providers update their programs every time a new vulnerability is found. And so the real necessity is to keep your system up to date.<\/p>\n Keeping your system up to date means to update all of your software regularly. If you run Microsoft or Apple, that means accepting automatic updates. If you run Linux, that means updating from a terminal every few days. The commands are: sudo su – [enter password ]apt-get update [wait for completion] apt-get upgrade.<\/p>\n If you do these things, your computer will be a lot safer than it has been.<\/p>\n OUTSIDE INFLUENCES<\/strong><\/p>\n A critical safety practice is that you do not install random software. If you aren\u2019t highly confident of where it came from and what it\u2019s for, don\u2019t install it. By installing new software you\u2019re allowing it into the heart of your computer. Don\u2019t do that unless you\u2019re sure. Likewise, do not open attachments to emails unless you\u2019re very sure where they\u2019re coming from and what they are. The etiquette should be that the sender notes, \u201cI have attached a PDF to this email that_____.\u201d Without that, or something very much like it \u2013 and from trusted parties \u2013 do not click on it.<\/p>\n And if you\u2019re unsure whether the person sending you an email is really the person they claim to be, ask a question only your friend could answer, like, \u201cLast time we met, what did we talk about?\u201d (Or, \u201cwhat did we eat?\u201d, etc.)<\/p>\n Like software, any attachment you open is being granted entry to your computer. That\u2019s dangerous. And malicious attachments are very common. I get one every 2-3 days.<\/p>\n YOUR BROWSER<\/strong><\/p>\n As your regular browser, do not use Explorer or Safari. Instead, use Firefox or Brave. Both are simple downloads. More than that, both will allow you to use a very important Add-on (Extension) called NoScript. In Firefox you\u2019ll find Add-Ons in the main menu. In Brave, you\u2019ll find Extensions in the main menu. Just find NoScript and install it.<\/p>\n JavaScript is both very common and very exploitable. NoScript closes that opening. You\u2019ll have to turn it on for a few things, but NoScript allows you direct and variable control. You\u2019ll like it<\/p>\n Spend a bit of time on the privacy settings for your browser, and don\u2019t worry about turning things off; you can turn then back on with a click if you find you\u2019ve been too restrictive.<\/p>\n EMAIL<\/strong><\/p>\n Use the Thunderbird client for your email. It\u2019s made by the Firefox people and is likewise a simple download. STOP using webmail. Close your Google and Yahoo accounts. Get a privacy-centered email provider. That means that they have no web interface. They should not store or use your data, and they should clean your mail’s headers. You must also:<\/p>\n Turn off Geolocation: Get to Advanced settings (usually via Files > Preferences > Advanced > Config Editor button), ignore the warning, scroll down to geo.enabled, double[1]click to change the default value to False.<\/p>\n YOUR OPERATING SYSTEM<\/strong><\/p>\n If you do everything above, your computer will be in good condition, but you have one remaining issue, which is your operating system.<\/p>\n I suppose there\u2019s no easy way to say this, and so I\u2019ll just say it directly: Windows is a privacy disaster and Windows 10 is almost spyware. Take 15 minutes to read their privacy statement if you’re unsure about that.<\/p>\n Apple is less bad than Microsoft, but they\u2019re not ideal either. If you\u2019re going to get one or the other, get Apple, but better still, use Linux.<\/p>\n Linux is usually free, and it\u2019s open-source software, meaning that any competent programmer can check it for malicious code. Furthermore, there are many versions of it, each targeted to a specific use case. Most of the world\u2019s commercial servers run Linux, so this is not a dodgy new thing, but the most tried and tested of software.<\/p>\n You\u2019ll have no trouble running Linux. The menus and choices are almost the same as the others, and you can find direct replacements for most programs or even program suites like Office (Libre Office.)<\/p>\n We generally recommend the Mint variety of Linux, but Ubuntu and others are quite fine. Lots of computers come straight from the factory with Linux on them these days, but if not, just get a Microsoft machine and reflash it for Linux. If you don\u2019t know how to do that (it isn\u2019t very hard), hire a local IT guy for an hour or two, and he\/she will do it for you. FINAL THOUGHTS You now have the information you need to protect your computer. It\u2019s really not that hard. Go piece by piece and you\u2019ll find the job done before long. For more information on privacy and security, please contact our office HERE.<\/p>\n <\/p>\n <\/p>\n <\/p>\n","protected":false},"excerpt":{"rendered":" DIGITAL PRIVACY How To Protect Your Computer BY PAUL ROSENBERG \u201cHow do I protect my computer\u201d is one of the questions we hear most often. And so I\u2019d like to answer it today. But before I do, I\u2019d like to remind you that the information that goes to and from your computer is […]<\/p>\n","protected":false},"author":702,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","om_disable_all_campaigns":false,"footnotes":""},"yst_prominent_words":[37401,37397,37389,16917,37390,37403,37400,37396,37388,37404,37391,37395,37402,37393,37394,37399,37392,37398,37405,37387],"acf":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/pages\/46616"}],"collection":[{"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/users\/702"}],"replies":[{"embeddable":true,"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/comments?post=46616"}],"version-history":[{"count":3,"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/pages\/46616\/revisions"}],"predecessor-version":[{"id":46621,"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/pages\/46616\/revisions\/46621"}],"wp:attachment":[{"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/media?parent=46616"}],"wp:term":[{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/www.escapeartist.com\/wp-json\/wp\/v2\/yst_prominent_words?post=46616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}\n
\n